How to set up security and privacy in ASICS Runkeeper
A detailed guide to configuring privacy settings in the ASICS Runkeeper running app.
37 articles
A detailed guide to configuring privacy settings in the ASICS Runkeeper running app.
A vulnerability in Kia’s web portal made it possible to hack cars and track their owners. All you needed was the car’s VIN number or just its license plate number.
A detailed guide on setting up privacy in the adidas Running app.
A detailed guide to configuring privacy settings in the MapMyRun fitness tracker.
This guide will walk you through the essential privacy settings in the Nike Run Club training app.
Want to keep your runs, rides, and hikes private on Strava? This guide will walk you through the essential privacy settings in this popular fitness app.
Running apps know a lot about their users, so it’s worth setting them up to ensure your data doesn’t fall into the wrong hands. Here’s how.
Recent research describes a method for snooping on what Apple Vision Pro users enter on the virtual keyboard.
At risk are users of modified versions of Spotify, WhatsApp, Minecraft, and other apps from Google Play.
Even in 2024, the world is rife with digital paranoia and superstition. Is my smartphone tracking me? Will incognito mode make me invisible? This post answers these and lots of other related questions.
Worried about your access to Telegram and its privacy after Pavel Durov’s arrest? Here’s what you should (and shouldn’t!) do right now.
Small beacons like AirTag make it easy to find a lost wallet or keys — but are also often used for covert tracking. Now you can detect stalkers and protect yourself — regardless of what kind of smartphone you have.
Training AI requires a colossal amount of data. Meta seems to have found a “brilliant” solution — using the personal data of its own users.
The new AI function in Microsoft Windows has already been dubbed a “security nightmare” on the internet. What risks does it carry, and how to stay safe?
The exact location of your router is publicly available through global Wi-Fi geolocation databases. Let’s explore why this is necessary, and the risks it entails and how to mitigate them.
How to use private browsing mode, what it doesn’t protect against, and why Google is deleting five billion dollars’ worth of user data.
Vehicle makers sell the data collected by connected cars about their users’ driving habits to data brokers – who resell it to insurance companies.
Advertising firms’ extensive collection of personal data is becoming of great use to intelligence agencies. So how to guard against mass surveillance?
Commercial spyware — what it is, how it infiltrates devices, what it can do once inside, and how to defend against it.
Our researchers discovered spyware-infected WhatsApp modifications distributed through Telegram channels and websites with WhatsApp mods.